DS0012 Script
A file or stream containing a list of commands, allowing them to be launched in sequence312
| Item | Value | 
|---|---|
| ID | DS0012 | 
| Platforms | Windows | 
| Collection Layers | Host | 
| Version | 1.1 | 
| Created | 20 October 2021 | 
| Last Modified | 07 December 2022 | 
Data Components
Script Execution
The execution of a text file that contains code via the interpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)
References
- 
Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021. ↩
 - 
Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021. ↩
 - 
Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021. ↩
 - 
Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023. ↩
 - 
Sayre, K., Ogden, H., Roberts, C. (2018, October 10). VBA Stomping — Advanced Maldoc Techniques. Retrieved September 17, 2020. ↩
 - 
Bontchev, V. (2019, July 30). pcodedmp.py - A VBA p-code disassembler. Retrieved September 17, 2020. ↩
 - 
decalage2. (2019, December 3). python-oletools. Retrieved September 18, 2020. ↩
 - 
MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021. ↩
 - 
The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021. ↩
 - 
Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. ↩
 - 
Nelson, M. (2017, January 5). Lateral Movement using the MMC20 Application COM Object. Retrieved November 21, 2017. ↩